Full Paper View Go Back
An Implementation of an Vulnerability Management in Complex Networks and Defining Severity
Rikam Palkar1 , Swati Chopade2
Section:Research Paper, Product Type: Isroset-Journal
Vol.6 ,
Issue.3 , pp.35-38, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrcse/v6i3.3538
Online published on Jun 30, 2018
Copyright © Rikam Palkar, Swati Chopade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rikam Palkar, Swati Chopade, “An Implementation of an Vulnerability Management in Complex Networks and Defining Severity,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.35-38, 2018.
MLA Style Citation: Rikam Palkar, Swati Chopade "An Implementation of an Vulnerability Management in Complex Networks and Defining Severity." International Journal of Scientific Research in Computer Science and Engineering 6.3 (2018): 35-38.
APA Style Citation: Rikam Palkar, Swati Chopade, (2018). An Implementation of an Vulnerability Management in Complex Networks and Defining Severity. International Journal of Scientific Research in Computer Science and Engineering, 6(3), 35-38.
BibTex Style Citation:
@article{Palkar_2018,
author = {Rikam Palkar, Swati Chopade},
title = {An Implementation of an Vulnerability Management in Complex Networks and Defining Severity},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {3},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {35-38},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=646},
doi = {https://doi.org/10.26438/ijcse/v6i3.3538}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.3538}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=646
TI - An Implementation of an Vulnerability Management in Complex Networks and Defining Severity
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Rikam Palkar, Swati Chopade
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 35-38
IS - 3
VL - 6
SN - 2347-2693
ER -
Abstract :
Complex systems are found in an extensive variety of areas from technological and social to biological environments. In spite of this scope of uses and settings in which complex systems are utilized as models, examines propose that numerous genuine systems are represented by a comparable elements. An important characteristic is that in general such networks are robust against failures but vulnerable against targeted attacks. Impossible to miss trademark: resilience. In this technological era business endeavor to stay aware of evolving technology, it implies that they have a high capacity to absorb changes. However, resilience mechanisms are not present per se in technological networks. Thus, this work presents a framework for vulnerability assessment, vulnerability analysis and vulnerability management in versatile technological networks
Key-Words / Index Term :
Network, VMP
References :
[1] “CWE- Common Weakness Enumeration”,Available: http://nvd.nist.gov/
[2] “NVD Data Feed and Product Integration”, National Vulnerability Database, Available: http://nvd.nist.gov/download.cfm
[3] N. W. Adger,“Vulnerability,” Global Environmental Change, no. 3, pp. 268–281, August.
[4] A. Reka, J. Hawoong, and B. Albert-Laszlo,“Error and attack tolerance of complex networks,” Nature, no. 6794, pp. 378–382, July.
[5] “CVE, Common Vulnerabilities and Exposures.” http://cve.mitre.org/
[6] http://www.metasploit.com/
[7] http://www.tenable.com/products/nessus
[8] M.E.J. Newman "Analysis of weighted networks", The American Physical Society.
[9] “The OVAL Language.” http://oval.mitre.org/ - Open vulnerability and assessment language.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.